Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

mpicpp sends this news from CNET:
Reports are emerging that Samsung smart TVs have begun inserting short advertisements directly into video streaming apps, with no influence from the third-party app providers. The news comes just days after Samsung made headlines for another incursion into users' lounge rooms, when it was revealed that its TV voice recognition software is capable of capturing personal information and transmitting it to third parties. ... The issue has been reported on the Plex streaming service — a brand of media player that allows users to stream their own video from a personal library or hard drive and push it to a smart TV.
Samsung says this was not intentional, and that they've fixed it so the ads should no longer show up.

"Aspie"-ness itself is no license, I agree. These peeps bring other skills to the table that make it worth tolerating their downsides. By all reports, Jobs was a narcissistic a-hole most of the time, but his eye for design and usability made him worthwhile. I got tired of working for/with people like that so I no longer do. I might have made one kernel contribution long ago, but no occasionto do Linux kernel work since then.

An anonymous reader points out this advancement in 3D printing. This week, at the International Manufacturing Technology Show (IMTS) in Chicago, Arizona-based automobile manufacturer Local Motors stole the show. Over the six day span of the IMTS, the company managed to 3D print and assemble an entire automobile, called the "Strati," live in front of spectators. Although the Strati is not the first ever car to be 3D printed, the advancements made by Local Motors with help from Cincinnati Inc, and Oak Ridge National Laboratory, have produced a vehicle in days rather than months.

Coming late to this party, I can only share this one datapoint: If I recollect right, it was the hardware on the Burroughs Large Systems that was memory-safe. Arrays were done as Segment Descriptors, and if you indexed outside the segment it raised an exception. Byte-addressed (for 6-bit, 8-bit, etc bytes) were done as "String Descriptors" that referred to the Segment Descriptor.

The only other hardware I know of that did this lately was the UCSB P-system; there may be others since then.

Taco Cowboy writes The subway system in Hong Kong has one of the best uptimes: 99.9%, which beats London's tube or NYC's sub hands down. In an average week as many as 10,000 people would be carrying out 2,600 engineering works across the system — from grinding down rough rails to replacing tracks to checking for damages. While human workers might be the ones carrying out the work, the one deciding which task is to be worked on, however, isn't a human being at all. Each and every engineering task to be worked on and the scheduling of all those tasks is being handled by an algorithm. Andy Chun of Hong Kong's City University, who designed the AI system, says, "Before AI, they would have a planning session with experts from five or six different areas. It was pretty chaotic. Now they just reveal the plan on a huge screen." Chun's AI program works with a simulated model of the entire system to find the best schedule for necessary engineering works. From its omniscient view it can see chances to combine work and share resources that no human could. However, in order to provide an added layer of security, the schedule generated by the AI is still subject to human approval — Urgent, unexpected repairs can be added manually, and the system would reschedule less important tasks. It also checks the maintenance it plans for compliance with local regulations. Chun's team encoded into machine readable language 200 rules that the engineers must follow when working at night, such as keeping noise below a certain level in residential areas. The main difference between normal software and Hong Kong's AI is that it contains human knowledge that takes years to acquire through experience, says Chun. "We asked the experts what they consider when making a decision, then formulated that into rules – we basically extracted expertise from different areas about engineering works," he says.

An anonymous reader writes "A research project dubbed the 'Array of Things' will add sensors for public monitoring throughout Chicago. The project is being started by a collaborative effort between the University of Chicago and Argonne National Laboratories. The goal of the project is to build a permanent data collection infrastructure to monitor things that might help government officials, researchers and companies better understand the city environment. Sensors will examine various attributes such as air quality, wind, light, sound heat, precipitation, and of course cell phone data. Eventually the researchers would like to see the sensors exist as a public utility throughout the entire city to help public, private and academic partners learn about the city. Researchers say there is nothing to fear about privacy because the sensors will only count people by observing cellphone traffic. With such assurances from researchers working in a shining example of transparency and democratic freedom like Chicago, what could possible go wrong?"

schwit1 sends this news from The Verge:
"Tamerlan Tsarnaev, the primary conspirator in the Boston Marathon bombing that killed three people, slipped through airport security because his name was misspelled in a database, according to a new Congressional report. The Russian intelligence agency warned U.S. authorities twice that Tsarnaev was a radical Islamist and potentially dangerous. As a result, Tsarnaev was entered into two U.S. government databases: the Terrorist Identities Datamart Environment and the Treasury Enforcement Communications System (TECS), an interagency border inspection database.

A special note was added to TECS in October of 2011 requiring a mandatory search and detention of Tsarnaev if he left the country. 'Detain isolated and immediately call the lookout duty officer,' the note reportedly said. 'Call is mandatory whether or not the officer believes there is an exact match.' 'Detain isolated and immediately call the lookout duty officer.' Unfortunately, Tsarnaev's name was not an exact match: it was misspelled by one letter. Whoever entered it in the database spelled it as 'Tsarnayev.' When Tsarnaev flew to Russia in January of 2012 on his way to terrorist training, the system was alerted but the mandatory detention was not triggered. Because officers did not realize Tsarnaev was a high-priority target, he was allowed to travel without questioning."